You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: learn-pr/azure/manage-linux-with-arc/includes/1-introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,4 +1,4 @@
1
-
Microsoft Azure Arc can help you manage your Linux instances in addition to your Windows resources. Azure Arc provides a set of technologies for organizations that want to simplify their complex and distributed environments. Azure Arc provides a centralized, unified, and self-service approach to managing Linux resources.
1
+
Azure Arc can help you manage your Linux instances in Azure, in addition to any Windows resources. Azure Arc provides a set of technologies for organizations that want to simplify their complex and distributed environments. Azure Arc provides a centralized, unified, and self-service approach to managing Linux resources.
2
2
3
3
Contoso, Ltd. is a midsize financial services company in London with a branch office in New York City. Contoso deployed and evaluated Azure Arc-enabled servers for their on-premises Windows servers. Given their positive experience with Azure Arc on their Windows estate, management is tasking you with learning about Azure Arc-enabled server capabilities for similarly managing Linux workloads.
Azure Arc lets you manage physical and virtual Linux machines hosted outside of Azure, on your corporate network, or other cloud provider. Organizations like Contoso can manage their Linux resources with Azure just as they do their Arc-enabled Windows machines. Linux machines onboarded to Azure Arc enjoy the same capabilities as native Azure machines, including standard Azure constructs such as Azure policy and applying tags.
1
+
Azure Arc lets you manage physical and virtual Linux machines hosted outside of Azure, whether on your corporate network or on another cloud provider. Organizations like Contoso can manage their Linux resources with Azure, just as they do their Arc-enabled Windows machines. Linux machines onboarded to Azure Arc enjoy the same capabilities as native Azure machines, including standard Azure constructs such as Azure policy and applying tags.
2
2
3
3
Once your Linux machines are onboarded to Azure Arc, you can:
4
4
5
5
- Proactively monitor the OS and workloads running on the machine.
6
-
- Manage the machines using automation runbooks or solutions like Update Management.
6
+
- Manage the machines using automation runbooks or solutions such as Update Manager.
7
7
- Use other Azure services such as Microsoft Defender for Cloud.
8
8
9
9
## Supported Linux distributions
10
10
11
-
The following Linux distributions are officially supported for the Azure Connected Machine agent:
11
+
The Azure Connected Machine agent supports a wide range of Linux distributions, including recent versions of:
12
12
13
-
- Ubuntu 18.04, 20.04, and 22.04 LTS12
14
-
- Debian 11 and 12
15
-
- Rocky Linux 8 and 9
16
-
- SUSE Linux Enterprise Server (SLES) 12 SP3-SP5 and 15
17
-
- Red Hat Enterprise Linux (RHEL) 7, 8, and 9
18
-
- AlmaLinux 9
19
-
- Amazon Linux 2 and 2023
20
-
- Azure Linux (CBL-Mariner) 2.0
21
-
- Oracle Linux 7, 8 and 9
13
+
- Ubuntu
14
+
- Debian
15
+
- Rocky Linux
16
+
- SUSE Linux Enterprise Server (SLES)
17
+
- Red Hat Enterprise Linux (RHEL)
18
+
- AlmaLinux
19
+
- Amazon Linux
20
+
- Oracle Linux
21
+
22
+
x86-64 (64-bit) architecture is fully supported, while only some features are supported on Arm64. The Azure Connected Machine agent doesn't run on 32-bit architectures.
22
23
23
24
## Change tracking and inventory
24
25
@@ -28,35 +29,35 @@ You can track changes in your Azure Arc Linux machines to help you pinpoint oper
28
29
- Linux files
29
30
- Linux daemons
30
31
31
-
## Update Management
32
+
## Update management
32
33
33
-
Your onboarded Linux machines can use Update Management to manage your operating system updates. You can quickly assess the status of available updates and manage the process of installing required updates for your Linux machines. Update Management integrates with Azure Monitor Logs to store update assessments and update deployment results as log data.
34
+
Your onboarded Linux machines can use Azure Update Manager to manage your operating system updates. You can quickly assess the status of available updates and manage the process of installing required updates for your Linux machines.
34
35
35
36
## Security
36
37
37
-
Linux machines on Azure Arc enjoy the same security features as all Azure resources, including Microsoft Defender for Cloud and Microsoft Sentinel.
38
+
Linux machines on Azure Arc can use the same security features as all Azure resources, including Microsoft Defender for Cloud and Microsoft Sentinel.
38
39
39
40
### Microsoft Defender for Cloud
40
41
41
-
Microsoft Defender for Cloud is a Cloud Security Posture Management (CSPM) and Cloud Workload Protection Platform (CWPP). Defender for cloud can monitor the security posture of your Linux machines on Azure Arc and fills three vital needs as you manage the security of your Linux resources and workloads:
42
+
Microsoft Defender for Cloud is a cloud-native application protection platform (CNAPP), including a cloud security posture management (CSPM) solution and a cloud workload protection platform (CWPP). Defender for Cloud can monitor the security posture of your Linux machines on Azure Arc by:
42
43
43
-
-Provides continuous assessment of your security posture so you can track new security opportunities and precisely report on the progress of your security efforts.
44
-
-Secures your workloads with step-by-step actions that protect your workloads from known security risks.
45
-
-Provides alerts to defend your workloads in real-time so you can react immediately and prevent security events from developing.
44
+
-Providing continuous assessment of your security posture, so you can track new security opportunities and precisely report on the progress of your security efforts.
45
+
-Securing your workloads with step-by-step actions that protect your workloads from known security risks.
46
+
-Providing alerts to defend your workloads in real-time, so you can respond immediately and limit the risk to your resources
46
47
47
48
### Microsoft Sentinel
48
49
49
-
Microsoft Sentinel is an integrated SIEM (scalable, cloud-native, security information, and event management) and a SOAR (security orchestration, automation, and response) solution. Microsoft Sentinel delivers threat intelligence, providing a single solution for attack detection, proactive hunting, and threat response. It provides a birds-eye view across the enterprise. Microsoft Sentinel alleviates the stress of increasingly sophisticated attacks, increasing volumes of alerts, and long resolution time frames.
50
+
Microsoft Sentinel is a scalable, cloud-native security information and event management (SIEM) with built-in security orchestration, automation, and response (SOAR). Microsoft Sentinel delivers threat intelligence, providing a single solution for attack detection, proactive hunting, and threat response. It provides a birds-eye view across the enterprise. Microsoft Sentinel alleviates the stress of increasingly sophisticated attacks, increasing volumes of alerts, and long resolution time frames.
50
51
51
-
The benefits of Microsoft Sentinel include:
52
+
Microsoft Sentinel helps keep your environment secure by:
52
53
53
-
-Collect data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds.
54
-
-Detect previously undetected threats and minimize false positives using Microsoft's analytics and unparalleled threat intelligence.
55
-
-Investigate threats with artificial intelligence and hunt for suspicious activities at scale, tapping into years of cyber security work at Microsoft.
56
-
-Respond to incidents rapidly with built-in orchestration and automation of common tasks.
54
+
-Collecting data at cloud scale across all users, devices, applications, and infrastructure, both on-premises and in multiple clouds.
55
+
-Detecting previously undetected threats and minimize false positives using Microsoft's analytics and unparalleled threat intelligence.
56
+
-Investigating threats with artificial intelligence and hunt for suspicious activities at scale, tapping into years of cyber security work at Microsoft.
57
+
-Responding to incidents rapidly with built-in orchestration and automation of common tasks.
57
58
58
-
Microsoft Sentinel comes with many connectors for Microsoft solutions, available out of the box and providing real-time integration. For physical and virtual Linux machines, you can install the Log Analytics agent that collects the logs and forwards them to Microsoft Sentinel.
59
+
Microsoft Sentinel comes with many connectors for Microsoft solutions, available out of the box and providing real-time integration.
59
60
60
61
## Monitoring
61
62
62
-
Azure Monitor Agent (AMA) collects monitoring data from the guest operating system of Azure and hybrid virtual machines. It delivers it to Azure Monitor for use by features, insights, and other services, such as Microsoft Defender for Cloud. AMA uses data collection rules that let you define the types of data you want each agent you install to collect. Data collection rules allow you to create unique, scoped configurations for subsets of your Linux machines. These rules are independent of the workspace and the virtual machine, which means you can define a rule once and reuse it across machines and environments.
63
+
The Azure Monitor Agent collects monitoring data from the guest operating system of Azure and hybrid virtual machines. It delivers this data to Azure Monitor, allowing it to be used by other services, such as Microsoft Defender for Cloud. Data collection rules allow you to create unique, scoped configurations for subsets of your Linux machines. These rules are independent of the workspace and the virtual machine, which means you can define a rule once and reuse it across machines and environments.
0 commit comments